StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security practices not meeting the challenges (info technology) - Essay Example

Cite this document
Summary
Personal information can be attained by criminals to establish an identity at the victims expense. Confidential personal and medical information can be compromised that may…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Security practices not meeting the challenges (info technology)
Read Text Preview

Extract of sample "Security practices not meeting the challenges (info technology)"

Download file to see previous pages

There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats. Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology. While our information system has worked to make our data more secure, the threats of attack and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats.

Security threats originate from three sources. There are internal threats from corrupt employees, external threats that originate from external attacks on the system, and system failure. While direct attacks may compromise the data, system failure can cause a loss of information or system shutdown. While developing a system of access control minimizes attacks, system failures are dealt with through a system of redundancy and audit tracking. These systems are open to compromise by direct attack or well meaning employees that practice lax security measures.

The security of a database or network often begins with access control. At the system level this may mean the use of passwords. Passwords are easily compromised and are often shared for the purposes of convenience. Levels of granting only necessary access to a system or a file have been more helpful as data is made available only on a need to know basis. However, in a fast paced team environment, this may require man-hours that far exceed the realistic value of the security. According to Hu, Ferrariolo, and Kuhn, "If a single permission is incorrectly configured, a user will either be ineffective in performing his/her duties or will be given access to unintended information and systems, which could result in undermining the security posture of the organization" (36).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security practices not meeting the challenges (info technology) Essay”, n.d.)
Security practices not meeting the challenges (info technology) Essay. Retrieved from https://studentshare.org/miscellaneous/1542252-security-practices-not-meeting-the-challenges-info-technology
(Security Practices Not Meeting the Challenges (info Technology) Essay)
Security Practices Not Meeting the Challenges (info Technology) Essay. https://studentshare.org/miscellaneous/1542252-security-practices-not-meeting-the-challenges-info-technology.
“Security Practices Not Meeting the Challenges (info Technology) Essay”, n.d. https://studentshare.org/miscellaneous/1542252-security-practices-not-meeting-the-challenges-info-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security practices not meeting the challenges (info technology)

Writing project Part 2

Susan Krieger a reporter for Dow Jones Clean technology Insights in New York notes that billions of funds are pledged in support of renewable energy instead of encouraging the use of less energy in industrial production and domestic use.... From my point of view I think that newer energy conservation technology may be cost effective even with a high initial cost but are also yet to be embraced by the wider public due to unavailable information.... Energy Efficiency: challenges and Trends for Electric Utilities....
8 Pages (2000 words) Essay

Poor Security Policies of Welco Insurance PLC

Organizations are well connected because of technology such as the internet.... This technology also increases the risks that should be identified and necessary controls are in place to mitigate the new risks.... ) Dealing with system technology with complex operating work environment can be expensive and can impact the business profits.... The case study “Poor security Policies of Welco Insurance PLC” explores unpleasant findings of the internal audit and its further advice to prevent security breach attacks, Implement suitable measures, management and administrative, physical and technical control....
14 Pages (3500 words) Case Study

The History and Evolution of Border Security

It had five core objectives that include putting in place laws that allow apprehension of terrorists and their weapons as they attempt to cross illegally; prohibiting illegal entries through improved enforcement; detecting, apprehending, and prohibiting human, drugs and contraband smuggling; use of advanced detection technology; and reduction of crime in border communities, therefore, bettering the quality of life and economic vitality of those regions.... It has also made a move towards implementation and use of modern technology and computing systems to enforce Border Patrol laws....
11 Pages (2750 words) Research Paper

Global Concern in Food Sustainability

nbsp; This consistent degradation has posted a number of challenges in feeding a global population that is anticipated to reach over 9 million people in 2050 in accordance to a report issued by the FAO report (2014).... This degradation is due to the current farming practices that result in wind and water erosion, loss of topsoil compaction, organic matter, soil pollution, nutrient loss, and salinization.... This paper "Global Concern in Food Sustainability" focuses on the fact that global food security sustainability relates to “when the individual in all circumstances and times have access to safe, sufficient, and nutritious food to maintain an active and healthy lifestyle....
7 Pages (1750 words) Essay

Information Security as an Important Process

The paper 'Information Security as an Important Process' presents Information technology that is an area that has received much prominence in recent times, following the need for businesses to globalize and exploit opportunities existing beyond the borders of the country.... Realizing the importance that information and technology play in businesses, organizations have started making strategies.... The idea of businesses relying on information to create competitive advantages for their success has come with various unethical practices that other people have begun engaging in....
12 Pages (3000 words) Case Study

Virtual and Collaborative Teams Organization

virtual team is defined as a group of individuals who have links strengthened by networks and communication technology to work across geographical and organizational boundaries.... The author of this paper "Virtual and Collaborative Teams Organization" talks about the various challenges and barriers that can take place due to the virtual teams.... This paper will talk about the various challenges and barriers that can take place due to the virtual teams; it will also talk about how these teams are managed and what are their implications....
9 Pages (2250 words) Assignment

The Conflict Between Freedom and Security in Contemporary Liberal Democracies

The abuse of human rights, high handedness of the armed forces in doing their duty, the negligence of government machinery in meeting the needs of the people, the reluctance of political leadership in dealing with the issues regarding common good can be considered as main reasons that develop violent feelings in the minds of the dissatisfied young people.... … Freedom and security in Liberal DemocraciesIntroduction:In increasingly insecure society the liberal democracies are facing a dilemma between freedom and security....
12 Pages (3000 words) Essay

Design Management Training at Aardvark Dog Housing

By so doing, I adequately addressed challenges facing the implementation of Maritime Security and drew vivid discussion on the relevancy of ISPS Code technology over the existing one.... nbsp; The report consists of fundamental knowledge and experience gained in relation to Maritime security and the benefits gained from the program before making the concluding remark.... For instance, the report seeks to explain the issue of Maritime security....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us